/system/chre/platform/shared/ |
D | memory_manager.cc | 24 void *MemoryManager::nanoappAlloc(Nanoapp *app, uint32_t bytes) { in nanoappAlloc() argument 30 app->getInstanceId()); in nanoappAlloc() 35 app->getInstanceId()); in nanoappAlloc() 38 doAlloc(app, sizeof(HeapBlockHeader) + bytes)); in nanoappAlloc() 41 app->setTotalAllocatedBytes(app->getTotalAllocatedBytes() + bytes); in nanoappAlloc() 47 app->linkHeapBlock(header); in nanoappAlloc() 49 header->data.instanceId = app->getInstanceId(); in nanoappAlloc() 57 void MemoryManager::nanoappFree(Nanoapp *app, void *ptr) { in nanoappFree() argument 65 if (app->getInstanceId() != header->data.instanceId) { in nanoappFree() 67 app->getInstanceId(), header->data.instanceId); in nanoappFree() [all …]
|
/system/chre/test/simulation/ |
D | memory_test.cc | 77 auto app = loadNanoapp<App>(); in TEST_F() local 81 Nanoapp *nanoapp = getNanoappByAppId(app.id); in TEST_F() 88 sendEventToNanoapp(app, ALLOCATE, 100); in TEST_F() 96 sendEventToNanoapp(app, ALLOCATE, 200); in TEST_F() 103 sendEventToNanoapp(app, FREE, ptr1); in TEST_F() 109 sendEventToNanoapp(app, FREE, ptr2); in TEST_F() 138 auto app = loadNanoapp<App>(); in TEST_F() local 142 Nanoapp *nanoapp = getNanoappByAppId(app.id); in TEST_F() 149 sendEventToNanoapp(app, ALLOCATE, 100); in TEST_F() 157 sendEventToNanoapp(app, ALLOCATE, 200); in TEST_F() [all …]
|
D | ble_test.cc | 72 auto app = loadNanoapp<App>(); in TEST_F() local 75 sendEventToNanoapp(app, GET_CAPABILITIES); in TEST_F() 81 sendEventToNanoapp(app, GET_FILTER_CAPABILITIES); in TEST_F() 156 auto app = loadNanoapp<App>(); in TEST_F() local 159 sendEventToNanoapp(app, START_SCAN); in TEST_F() 166 sendEventToNanoapp(app, STOP_SCAN); in TEST_F() 206 auto app = loadNanoapp<App>(); in TEST_F() local 209 sendEventToNanoapp(app, START_SCAN); in TEST_F() 215 unloadNanoapp(app); in TEST_F() 272 auto app = loadNanoapp<App>(); in TEST_F() local [all …]
|
D | timer_test.cc | 88 auto app = loadNanoapp<App>(); in TEST_F() local 96 .findNanoappInstanceIdByAppId(app.id, &instanceId)); in TEST_F() 99 sendEventToNanoapp(app, START_TIMER); in TEST_F() 109 sendEventToNanoapp(app, STOP_TIMER, handle); in TEST_F() 115 sendEventToNanoapp(app, STOP_TIMER, handle); in TEST_F() 156 auto app = loadNanoapp<App>(); in TEST_F() local 164 .findNanoappInstanceIdByAppId(app.id, &instanceId)); in TEST_F() 167 sendEventToNanoapp(app, START_TIMER); in TEST_F() 174 unloadNanoapp(app); in TEST_F()
|
D | wifi_timeout_test.cc | 84 auto app = loadNanoapp<App>(); in TEST_F() local 88 sendEventToNanoapp(app, SCAN_REQUEST, timeOutCookie); in TEST_F() 102 sendEventToNanoapp(app, SCAN_REQUEST, successCookie); in TEST_F() 107 unloadNanoapp(app); in TEST_F() 153 auto app = loadNanoapp<App>(); in TEST_F() local 157 sendEventToNanoapp(app, SCAN_MONITOR_REQUEST, timeoutRequest); in TEST_F() 172 sendEventToNanoapp(app, SCAN_MONITOR_REQUEST, enableRequest); in TEST_F() 182 sendEventToNanoapp(app, SCAN_MONITOR_REQUEST, disableRequest); in TEST_F() 190 unloadNanoapp(app); in TEST_F() 252 auto app = loadNanoapp<App>(); in TEST_F() local [all …]
|
D | wifi_test.cc | 79 auto app = loadNanoapp<App>(); in TEST_F() local 83 sendEventToNanoapp(app, MONITORING_REQUEST, request); in TEST_F() 90 sendEventToNanoapp(app, MONITORING_REQUEST, request); in TEST_F() 142 auto app = loadNanoapp<App>(); in TEST_F() local 146 sendEventToNanoapp(app, MONITORING_REQUEST, request); in TEST_F() 155 unloadNanoapp(app); in TEST_F() 202 auto app = loadNanoapp<App>(); in TEST_F() local 206 sendEventToNanoapp(app, MONITORING_REQUEST, request); in TEST_F() 215 unloadNanoapp(app); in TEST_F() 218 app = loadNanoapp<App>(); in TEST_F() [all …]
|
D | gnss_test.cc | 124 auto app = loadNanoapp<App>(); in TEST_F() local 130 sendEventToNanoapp(app, LOCATION_REQUEST, request); in TEST_F() 158 sendEventToNanoapp(app, LOCATION_REQUEST, request); in TEST_F() 218 auto app = loadNanoapp<App>(); in TEST_F() local 223 sendEventToNanoapp(app, LOCATION_REQUEST, request); in TEST_F() 232 sendEventToNanoapp(app, LOCATION_REQUEST, request); in TEST_F() 286 auto app = loadNanoapp<App>(); in TEST_F() local 290 sendEventToNanoapp(app, LOCATION_REQUEST, request); in TEST_F() 299 unloadNanoapp(app); in TEST_F() 353 auto app = loadNanoapp<App>(); in TEST_F() local [all …]
|
/system/chre/core/tests/ |
D | memory_manager_test.cc | 39 Nanoapp app; in TEST() local 40 void *ptr = manager.nanoappAlloc(&app, 1u); in TEST() 44 manager.nanoappFree(&app, ptr); in TEST() 51 Nanoapp app; in TEST() local 52 manager.nanoappFree(&app, nullptr); in TEST() 59 Nanoapp app; in TEST() local 60 void *ptr = manager.nanoappAlloc(&app, 0u); in TEST() 68 Nanoapp app; in TEST() local 69 void *ptr = manager.nanoappAlloc(&app, manager.getMaxAllocationBytes() + 1); in TEST() 76 Nanoapp app; in TEST() local [all …]
|
/system/linkerconfig/testdata/golden_output/stage0/ |
D | ld.config.txt | 12 dir.system = /product/app/ 24 namespace.default.permitted.paths += /system/app 25 namespace.default.permitted.paths += /system/priv-app 27 namespace.default.permitted.paths += /system_ext/app 28 namespace.default.permitted.paths += /system_ext/priv-app 30 namespace.default.permitted.paths += /vendor/app 31 namespace.default.permitted.paths += /vendor/priv-app 33 namespace.default.permitted.paths += /system/vendor/app 34 namespace.default.permitted.paths += /system/vendor/priv-app 36 namespace.default.permitted.paths += /odm/app [all …]
|
/system/chre/test/simulation/inc/ |
D | test_util.h | 93 Nanoapp app; in loadNanoapp() local 94 loadNanoapp(app.name, app.id, app.version, app.perms, app.start, in loadNanoapp() 95 app.handleEvent, app.end); in loadNanoapp() 97 return app; in loadNanoapp() 108 void unloadNanoapp(Nanoapp app) { in unloadNanoapp() argument 110 unloadNanoapp(app.id); in unloadNanoapp() 183 void sendEventToNanoapp(const Nanoapp &app, uint16_t eventType) { in sendEventToNanoapp() argument 188 .findNanoappInstanceIdByAppId(app.id, &instanceId)) { in sendEventToNanoapp() 197 LOGE("No instance found for nanoapp id = 0x%016" PRIx64, app.id); in sendEventToNanoapp() 216 void sendEventToNanoapp(const Nanoapp &app, uint16_t eventType, in sendEventToNanoapp() argument [all …]
|
/system/extras/tests/workloads/ |
D | systemapps.sh | 156 for app in $appList 158 vout Starting $app... 162 resetJankyFrames $(getPackageName $app) 164 tmpTraceOut="$tmpTraceOutBase-$app.out" 166 startInstramentation "$app-$cur" 169 startInstramentation "$app-$cur" 0 176 t=$(startActivity $app) 178 t=$(forceStartActivity $app) 183 set -- $(getJankyFrames $(getPackageName $app)) 213 …printf "%-10s %5.0f %5.0f %4.0f(%2.0f%%) %2.0f/%2.0f/%2.0f\n" $app $t $diffTime $janks $jankP… [all …]
|
/system/chre/core/ |
D | event_loop.cc | 64 bool populateNanoappInfo(const Nanoapp *app, struct chreNanoappInfo *info) { in populateNanoappInfo() argument 67 if (app != nullptr && info != nullptr) { in populateNanoappInfo() 68 info->appId = app->getAppId(); in populateNanoappInfo() 69 info->version = app->getAppVersion(); in populateNanoappInfo() 70 info->instanceId = app->getInstanceId(); in populateNanoappInfo() 71 if (app->getTargetApiVersion() >= CHRE_API_VERSION_1_8) { in populateNanoappInfo() 72 CHRE_ASSERT(app->getRpcServices().size() <= Nanoapp::kMaxRpcServices); in populateNanoappInfo() 74 static_cast<uint8_t>(app->getRpcServices().size()); in populateNanoappInfo() 75 info->rpcServices = app->getRpcServices().data(); in populateNanoappInfo() 106 for (const UniquePtr<Nanoapp> &app : mNanoapps) { in findNanoappInstanceIdByAppId() local [all …]
|
/system/linkerconfig/testdata/golden_output/stage1/com.android.runtime/ |
D | ld.config.txt | 97 namespace.system.permitted.paths += /system/app 98 namespace.system.permitted.paths += /system/priv-app 100 namespace.system.permitted.paths += /system_ext/app 101 namespace.system.permitted.paths += /system_ext/priv-app 103 namespace.system.permitted.paths += /vendor/app 104 namespace.system.permitted.paths += /vendor/priv-app 106 namespace.system.permitted.paths += /system/vendor/app 107 namespace.system.permitted.paths += /system/vendor/priv-app 109 namespace.system.permitted.paths += /odm/app 110 namespace.system.permitted.paths += /odm/priv-app [all …]
|
/system/linkerconfig/testdata/golden_output/stage1/com.android.art/ |
D | ld.config.txt | 100 namespace.system.permitted.paths += /system/app 101 namespace.system.permitted.paths += /system/priv-app 103 namespace.system.permitted.paths += /system_ext/app 104 namespace.system.permitted.paths += /system_ext/priv-app 106 namespace.system.permitted.paths += /vendor/app 107 namespace.system.permitted.paths += /vendor/priv-app 109 namespace.system.permitted.paths += /system/vendor/app 110 namespace.system.permitted.paths += /system/vendor/priv-app 112 namespace.system.permitted.paths += /odm/app 113 namespace.system.permitted.paths += /odm/priv-app [all …]
|
/system/extras/memory_replay/traces/ |
D | TRACES | 7 Trace of the native camera app from start-up. 10 Trace of the Google Gmail app from start-up and through reading messages. 13 Trace of the Google Maps app from start-up while looking at various parts 17 Trace of the system app process surfaceflinger from start-up while 21 Trace of the system app process system_server from start-up while 25 Trace of the system app process systemui from start-up while 29 Trace of the Google YouTube app from start-up and while watching various 40 Why: Top 500 app using Unity engine. 42 Complete the tutorial. Restart the app with tracing enabled and play 53 Play first level. Restart the app with tracing enabled and play a few [all …]
|
/system/tools/aidl/ |
D | hiddenapi-greylist | 7 "android.app.admin.IDeviceAdminService", 8 "android.app.admin.IDevicePolicyManager", 9 "android.app.backup.IBackupManager", 10 "android.app.backup.IBackupManagerMonitor", 11 "android.app.backup.IBackupObserver", 12 "android.app.backup.IFullBackupRestoreObserver", 13 "android.app.backup.IRestoreObserver", 14 "android.app.backup.IRestoreSession", 15 "android.app.backup.ISelectBackupTransportCallback", 16 "android.app.IActivityController", [all …]
|
/system/sepolicy/private/ |
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 2 # Entered either by the app itself exec-ing the binary, or through 20 # app. The necessary MAC permissions for profiling are more maintainable and 21 # consistent if simpleperf is marked as an app domain as well (as, for example, 22 # it will then see the same set of system libraries as the app). 26 # Allow ptrace attach to the target app, for reading JIT debug info (using 30 # Allow using perf_event_open syscall for profiling the target app. 33 # Allow /proc/<pid> access for the target app (for example, when trying to 38 # profiler runs as when executed by the app. The signals are used to control 39 # the profiler (which would be profiling the app that is sending the signal). [all …]
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 2 # Entered either by the app itself exec-ing the binary, or through 20 # app. The necessary MAC permissions for profiling are more maintainable and 21 # consistent if simpleperf is marked as an app domain as well (as, for example, 22 # it will then see the same set of system libraries as the app). 26 # Allow ptrace attach to the target app, for reading JIT debug info (using 30 # Allow using perf_event_open syscall for profiling the target app. 33 # Allow /proc/<pid> access for the target app (for example, when trying to 38 # profiler runs as when executed by the app. The signals are used to control 39 # the profiler (which would be profiling the app that is sending the signal). [all …]
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 2 # Entered either by the app itself exec-ing the binary, or through 20 # app. The necessary MAC permissions for profiling are more maintainable and 21 # consistent if simpleperf is marked as an app domain as well (as, for example, 22 # it will then see the same set of system libraries as the app). 26 # Allow ptrace attach to the target app, for reading JIT debug info (using 30 # Allow using perf_event_open syscall for profiling the target app. 33 # Allow /proc/<pid> access for the target app (for example, when trying to 38 # profiler runs as when executed by the app. The signals are used to control 39 # the profiler (which would be profiling the app that is sending the signal). [all …]
|
/system/chre/platform/include/chre/platform/ |
D | memory_manager.h | 48 void *nanoappAlloc(Nanoapp *app, uint32_t bytes); 56 void nanoappFree(Nanoapp *app, void *ptr); 64 uint32_t nanoappFreeAll(Nanoapp *app); 131 void *doAlloc(Nanoapp *app, uint32_t size); 138 void doFree(Nanoapp *app, void *ptr);
|
/system/chre/platform/freertos/ |
D | memory_manager.cc | 23 void *MemoryManager::doAlloc(Nanoapp *app, uint32_t bytes) { in doAlloc() argument 24 if (app->isTcmApp()) { in doAlloc() 31 void MemoryManager::doFree(Nanoapp *app, void *ptr) { in doFree() argument 32 if (app->isTcmApp()) { in doFree()
|
/system/chre/platform/slpi/ |
D | memory_manager.cc | 24 void *MemoryManager::doAlloc(Nanoapp *app, uint32_t bytes) { in doAlloc() argument 25 if (app->isUimgApp()) { in doAlloc() 32 void MemoryManager::doFree(Nanoapp *app, void *ptr) { in doFree() argument 33 if (app->isUimgApp()) { in doFree()
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 2 # Entered either by the app itself exec-ing the binary, or through 11 # app. The necessary MAC permissions for profiling are more maintainable and 12 # consistent if simpleperf is marked as an app domain as well (as, for example, 13 # it will then see the same set of system libraries as the app). 17 # Allow ptrace attach to the target app, for reading JIT debug info (using 21 # Allow using perf_event_open syscall for profiling the target app. 24 # Allow /proc/<pid> access for the target app (for example, when trying to 36 # Profiling must be confined to the scope of an individual app.
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 2 # Entered either by the app itself exec-ing the binary, or through 11 # app. The necessary MAC permissions for profiling are more maintainable and 12 # consistent if simpleperf is marked as an app domain as well (as, for example, 13 # it will then see the same set of system libraries as the app). 17 # Allow ptrace attach to the target app, for reading JIT debug info (using 21 # Allow using perf_event_open syscall for profiling the target app. 24 # Allow /proc/<pid> access for the target app (for example, when trying to 36 # Profiling must be confined to the scope of an individual app.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | simpleperf.te | 1 # Domain used when running /system/bin/simpleperf to profile a specific app. 2 # Entered either by the app itself exec-ing the binary, or through 11 # app. The necessary MAC permissions for profiling are more maintainable and 12 # consistent if simpleperf is marked as an app domain as well (as, for example, 13 # it will then see the same set of system libraries as the app). 17 # Allow ptrace attach to the target app, for reading JIT debug info (using 21 # Allow using perf_event_open syscall for profiling the target app. 24 # Allow /proc/<pid> access for the target app (for example, when trying to 36 # Profiling must be confined to the scope of an individual app.
|